Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-12556
HistoryMay 16, 2019 - 12:00 a.m.

CVE-2018-12556

2019-05-1600:00:00
ubuntu.com
ubuntu.com
7

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.007 Low

EPSS

Percentile

80.3%

The signature verification routine in install.sh in yarnpkg/website through
2018-06-05 only verifies that the yarn release is signed by any (arbitrary)
key in the local keyring of the user, and does not pin the signature to the
yarn release key, which allows remote attackers to sign tampered yarn
release packages with their own key.

Notes

Author Note
seth-arnold It appears this is about the install.sh that is run via a curl url

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.007 Low

EPSS

Percentile

80.3%

Related for UB:CVE-2018-12556